"The ability to apply a uniform access, guest network, and endpoint security policies within complex and dynamic environments is essential in order to defend mission critical resources and sensitive data."
-Sam Davis, vice president of business development for ForeScout Technologies
With the influx of tablets (iPads, etc.), smartphones (iPhones, Androids, etc.), and the Bring Your Own Device (BYOD)
phenomenon, wireless is quickly becoming the new norm for network connectivity. The days of network security being dependent on a directory server profile is over.
The security considerations of operating wired local area networks (LANs) and clients are well known. Ubiquitous wireless networks on the other hand are newer and so are the aspects of operating these networks. Today, a wireless network designed properly is widely considered equal to, or in many cases more secure than most deployed wired network. This is accomplished by applying multiple layers of security through mechanisms such as authentication, encryption, client classification and IDS/IPS (intrusion Detection and Intrusion Prevention Services) the wireless network can be assuredly secured.
A Xirrus wireless solution provides this layered approach, from the ability to ID and classify users, securely protect data as it traverses the network, to monitor the surrounding RF environment for threats. All these capabilities are integrated in a single device, thus allowing a secured, high performance wireless network to replace existing wired networks and deployable with 75% fewer components that any other wireless solution.
The following authentication methods are integrated in the Xirrus Solution:
RADIUS 802.1x –Arrays support standard 802.1x allowing them to support internal or external RADIUS services for client authentication. 3rd party RADIUS is also supported
Pre-Shared Key (PSK) – Uses a pass-phrase or key that is manually distributed to all authorized users. The same pass-phrase is given to client devices and entered in each Array
MAC Access Control Lists (ACLs) – MAC access control lists provide a list of client adapter MAC addresses that are allowed or denied access to the wireless network
Web Page Redirect (Captive Portal) – Integrated in the Array offers web based authentication against an internal or external RADIUS server